Fact-checked by Grok 2 weeks ago

Ciphertext indistinguishability

Ciphertext indistinguishability is a foundational property in that requires an scheme to produce ciphertexts for different s that are computationally indistinguishable to any efficient adversary, ensuring no discernible information about the underlying plaintext is revealed beyond its length or format. This concept was pioneered by and Silvio Micali in their 1982 paper on probabilistic , where they formalized it as a means to achieve secure public-key by incorporating into the encryption process, making each encryption unique even for the same message. They demonstrated that this indistinguishability is equivalent to , a stronger intuitive guarantee that no polynomial-time adversary can compute any partial function of the plaintext from the ciphertext with non-negligible advantage. Formally, ciphertext indistinguishability is often defined via the IND-CPA (indistinguishability under ) security : a challenger generates a key pair, provides the public key to an adversary who may query encryptions of chosen plaintexts; the adversary then submits two equal-length plaintexts m_0 and m_1, receives an encryption of one chosen at random, and attempts to guess the index. The scheme is secure if the adversary's advantage over random guessing (1/2) is negligible in the security parameter. This model captures basic against passive adversaries with access to an encryption . Stronger variants address active attacks, such as IND-CCA2 (indistinguishability under ), where the adversary can also query a adaptively, except for the challenge ciphertext itself; security here implies IND-CPA and is essential for applications like secure messaging protocols. These notions underpin widely deployed systems: TLS often relies on them under assumptions like the hardness of the problem, while post-quantum encryption candidates, such as those standardized by NIST as of 2024 (e.g., ML-KEM based on lattice problems), provide IND-CCA security against quantum adversaries.

Introduction

Core Concept

Ciphertext indistinguishability is a fundamental privacy property in public-key schemes, ensuring that an adversary cannot determine which of two possible messages was used to produce a given with a probability significantly better than random guessing. Formally, an scheme achieves indistinguishability if, for any two equal-length chosen by a computationally bounded adversary, the resulting are computationally indistinguishable, meaning no probabilistic polynomial-time can identify the correct with non-negligible advantage over 1/2. This property relies on the inherent in probabilistic , where the same can produce different under the same key, preventing patterns that could reveal information about the underlying message. Unlike perfect secrecy, which provides where no adversary—even one with unbounded computational power—can gain any information about the from the , offers computational based on the hardness of underlying mathematical problems. Perfect secrecy, as defined by , requires keys at least as long as the messages themselves, making it impractical for most applications beyond one-time pads. In contrast, indistinguishability assumes only that certain problems (e.g., quadratic residuosity in the Goldwasser-Micali scheme) are hard for polynomial-time adversaries, allowing for shorter keys and efficient implementations suitable for real-world use. A simple example illustrates this concept: consider encrypting a single bit, either 0 or , using a probabilistic . An adversary observing the should be unable to distinguish whether it encrypts 0 or with success probability greater than 1/2 plus a of the security parameter, even after seeing multiple such encryptions. Deterministic schemes fail this test, as repeated encryptions of the same bit produce identical ciphertexts, allowing easy identification. This property is essential for confidentiality in secure communication, as it guarantees that ciphertexts reveal no discernible information about the plaintext content, forming the basis for modern cryptographic protocols that protect sensitive data in transit. Without indistinguishability, adversaries could infer message details from observed ciphertexts, compromising privacy in applications like email encryption or secure web browsing.

Historical Background

The concept of ciphertext indistinguishability originated in 1982 with Shafi Goldwasser and Silvio Micali's seminal work on probabilistic encryption, which introduced a formal framework for ensuring that encryptions of different plaintexts are computationally indistinguishable to an adversary with access to the public key and encryption algorithm. This approach marked a pivotal shift from earlier deterministic encryption schemes, such as the RSA cryptosystem proposed in 1978, where identical plaintexts always produced identical ciphertexts, enabling straightforward attacks like chosen-plaintext scenarios by revealing patterns. Goldwasser and Micali linked this indistinguishability to semantic security, emphasizing privacy against polynomial-time adversaries without assuming specific computational hardness assumptions beyond the quadratic residuosity problem. In the late and , the notion evolved through formalizations tailored to public-key settings, building on the IND-CPA foundations to address multi-user scenarios and efficiency, with further refinements by Mihir Bellare, Alexandra Boldyreva, and Silvio Micali in 2000. Extensions to stronger models, including chosen-ciphertext attacks (), were advanced by Mihir Bellare and Phillip Rogaway in their 1998 analysis of security notions, which clarified hierarchies like IND-CCA1 and IND-CCA2 and established equivalences among privacy definitions. These developments facilitated the design of practical schemes resilient to adaptive adversaries, influencing the transition from ad-hoc constructions to provably secure systems based on standard assumptions like the decisional Diffie-Hellman problem. Key milestones included the broader adoption of probabilistic methods, as seen in the Dolev-Dwork-Naor construction of 1991, which achieved IND-CCA using non-interactive zero-knowledge proofs, and the integration of these ideas into symmetric modes. This evolution directly impacted standards, such as the Galois/Counter Mode (GCM) for , standardized by NIST in 2007, which provides IND-CCA through combined and , ensuring resistance to forgery and decryption attacks in protocols like TLS. Post-2000 refinements extended these concepts to hybrid paradigms, where public-key mechanisms encrypt symmetric keys for bulk data, with works like the 2002 by Bellare, Boldyreva, and Staddon addressing IND-CPA in multi-recipient settings for in real-world applications.

Adversarial Models

In the (CPA) model, an adversary gains access to a public , enabling it to obtain ciphertexts for any arbitrary plaintexts it selects. This access allows the adversary to query the with messages before receiving one or more challenge ciphertexts, providing insights into the process without revealing keys. The model explicitly denies the adversary any decryption capabilities, distinguishing CPA from more powerful chosen-ciphertext attack (CCA) variants where decryption oracles are available. This limitation positions CPA as a baseline for evaluating encryption schemes against adversaries that can only observe or influence encryptions passively. Formally, the adversary is represented as a probabilistic polynomial-time (PPT) algorithm A equipped with an encryption oracle \mathsf{Encrypt}(m), which takes a plaintext m and returns its ciphertext under the public key. The PPT constraint ensures the adversary operates efficiently, bounded by polynomial time in the security parameter. In a typical attack scenario, the adversary might submit encryptions of known —such as test patterns or likely real-world data—to detect statistical biases or structural weaknesses in the , aiming to infer properties of the scheme. However, schemes proven secure under indistinguishability against chosen-plaintext attacks (IND-CPA) prevent the adversary from reliably distinguishing the challenge from an encryption of a different . This model reflects real-world threats from passive eavesdroppers who exploit side-channel information on plaintexts, such as in communications where an attacker can inject crafted traffic to observe resulting . A prominent example is the BEAST attack on TLS 1.0, where the adversary leverages the protocol's mode to perform chosen-plaintext queries via in a victim's , recovering session byte-by-byte.

Chosen-Ciphertext Attack

In chosen-ciphertext attacks (), an adversary is granted access to a decryption , enabling it to query the decryption of chosen ciphertexts and potentially exploit the encryption scheme's behavior under active interference. This model captures scenarios where attackers can tamper with encrypted messages in transit, such as in network communications, making it a more realistic threat than passive observation alone. The non-adaptive variant, known as CCA1 or the "lunchtime attack," allows the adversary to query the decryption oracle only before receiving the challenge ciphertext, with no further decryption queries permitted afterward. In this setup, a probabilistic polynomial-time (PPT) adversary \mathcal{A} first interacts with encryption and decryption oracles to obtain encryptions and decryptions of chosen plaintexts and ciphertexts, then receives a ciphertext (an encryption of one of two target messages under the public key), and cannot query the decryption oracle further or on the challenge itself. This models a temporary opportunity for the attacker, such as brief access to a decryption during an unattended period, limiting adaptive follow-up queries based on the challenge. In contrast, the (CCA2) provides the adversary with full access to both encryption and decryption throughout the interaction, excluding only the challenge ciphertext from decryption queries. Here, the adversary \mathcal{A} can query the decryption both before and after receiving the challenge, allowing it to adaptively refine its strategy based on partial information about the scheme's responses. This stronger model simulates persistent active adversaries capable of ongoing tampering and learning from decryption outcomes in real-time. CCA models empower adversaries to probe the encryption scheme's vulnerabilities, such as malleability, by submitting specially crafted or malformed to the . For instance, an attacker might modify a valid and query its decryption to infer relationships between plaintexts or detect weaknesses, thereby testing whether the scheme preserves secrecy under alterations. These capabilities highlight why security is essential for applications like secure email or TLS protocols, where messages may be intercepted and altered en route.

Formal Security Games

IND-CPA Game

The IND-CPA (indistinguishability under ) game provides a formal framework to define security against adversaries who can obtain encryptions of chosen plaintexts but lack access to the secret key or decryption capabilities. This game captures the essence of ciphertext indistinguishability by challenging the adversary to distinguish between encryptions of two messages of its choice. The definition applies to both public-key and symmetric schemes, with adaptations reflecting their differences. For public-key encryption schemes, the IND-CPA game proceeds as follows. A probabilistic polynomial-time (PPT) adversary \mathcal{A} interacts with a challenger. In the setup phase, the challenger runs the key generation algorithm to produce a key pair: (pk, sk) \leftarrow \text{Gen}(1^\lambda), where \lambda is the security parameter, and provides the public key pk to \mathcal{A}. During the query phase, \mathcal{A} may adaptively query an oracle that, on input a message m, returns a ciphertext c \leftarrow \text{Enc}(pk, m). At some point, \mathcal{A} submits two equal-length messages m_0, m_1 (with |m_0| = |m_1|) to the challenger for the challenge phase. The challenger selects a random bit b \leftarrow \{0,1\}, computes the challenge ciphertext c^* \leftarrow \text{Enc}(pk, m_b), and sends c^* to \mathcal{A}. \mathcal{A} may continue making oracle queries (typically without querying encryptions of m_0 or m_1 directly, though randomization ensures security). Finally, in the guess phase, \mathcal{A} outputs a bit b' as its guess for b. The adversary wins if b' = b. For symmetric schemes, structure is analogous but accounts for the secret remaining hidden from the adversary. The consists of algorithms \text{[Gen](/page/Gen)}(1^\lambda) \to k, \text{Enc}(k, m) \to c, and \text{Dec}(k, c) \to m. In the setup phase, the generates the secret k \leftarrow \text{[Gen](/page/Gen)}(1^\lambda) privately. The query phase allows \mathcal{A} to access an that returns c \leftarrow \text{Enc}(k, m) on input m. For the challenge, \mathcal{A} submits equal-length m_0, m_1; the picks b \leftarrow \{0,1\}, computes c^* \leftarrow \text{Enc}(k, m_b), and provides c^*. \mathcal{A} continues queries and outputs b', winning if b' = b. The key difference between the public-key and symmetric variants lies in key exposure and oracle necessity. In public-key settings, the public key pk is given to \mathcal{A}, enabling it to simulate its own encryptions using \text{Enc}(pk, \cdot) independently, though the formal game includes an for consistency with multi-query models. In symmetric settings, the k is entirely concealed, making the encryption oracle essential for \mathcal{A} to obtain valid ciphertexts under the target key. This reflects the public-key infrastructure (PKI) assumption, where public keys are verifiable and shared openly, versus the symmetric need for pre-shared secrecy. The adversary's advantage in the IND-CPA is defined as \text{Adv}^{\text{IND-CPA}}(\mathcal{A}) = \left| \Pr[b' = b] - \frac{1}{2} \right|. A is IND-CPA secure if, for all adversaries \mathcal{A}, \text{Adv}^{\text{IND-CPA}}(\mathcal{A}) \leq \text{negl}(\lambda), where \text{negl}(\lambda) is a in the security parameter \lambda. Formally, for a public-key \Pi = (\text{Gen}, \text{Enc}, \text{Dec}), \left| \Pr\left[ \text{IND-CPA}_{\Pi, \mathcal{A}}(\lambda) = 1 \right] - \frac{1}{2} \right| \leq \text{negl}(\lambda), where \text{IND-CPA}_{\Pi, \mathcal{A}}(\lambda) denotes the event that \mathcal{A} wins the game; the symmetric case follows identically with key generation yielding k. This ensures that no efficient adversary can distinguish challenge ciphertexts beyond a negligible probability over random guessing. Proofs of IND-CPA security for specific schemes typically employ arguments to bound the adversary's distinguishing advantage. For instance, in the ElGamal public-key scheme, a argument replaces components of the (such as the in the decisional Diffie-Hellman ) with random values across multiple worlds, showing each consecutive pair is indistinguishable under the DDH , yielding overall negligible advantage. Similar techniques apply to symmetric constructions like CTR mode with a secure PRF, where hybrids isolate the from true randomness. These outlines demonstrate reduction to standard hardness s without full proofs.

IND-CCA Games

The IND-CCA (indistinguishability under ) games extend the IND-CPA framework by granting the adversary access to a decryption , thereby modeling active attacks where the adversary can probe the decryption functionality to gather information about s. These games are divided into IND-CCA1 and IND-CCA2 variants, differing primarily in the timing and adaptability of oracle access, with IND-CCA2 providing a stronger notion by allowing post-challenge decryption queries (except on the challenge ciphertext itself). In the IND-CCA1 game, the adversary \mathcal{A} interacts with a challenger as follows: the challenger generates a key pair (pk, sk) for the public-key encryption scheme and provides pk to \mathcal{A}. \mathcal{A} may then make polynomially many queries to an encryption oracle O_{\text{Encrypt}}(pk, \cdot) and a decryption oracle O_{\text{Decrypt}}(sk, \cdot) during a left phase. Upon completion of this phase, \mathcal{A} submits two equal-length messages m_0, m_1, and the challenger selects a random bit b \in \{0,1\}, computes the challenge ciphertext c^* = \text{Enc}(pk, m_b), and sends c^* to \mathcal{A}. No further decryption queries are permitted after receiving c^*, though encryption queries may continue. Finally, \mathcal{A} outputs a guess b' for b. The advantage of \mathcal{A} is defined as \text{Adv}_{\text{IND-CCA1}}^{\Pi}(\mathcal{A}) = \left| \Pr[b' = b] - \frac{1}{2} \right|, where \Pi denotes the encryption scheme. A scheme \Pi is IND-CCA1 secure if for all probabilistic polynomial-time (PPT) adversaries \mathcal{A}, \text{Adv}_{\text{IND-CCA1}}^{\Pi}(\mathcal{A}) \leq \text{negl}(\lambda), where \lambda is the security parameter and \text{negl}(\cdot) is a negligible function. The IND-CCA2 game strengthens the model by permitting adaptive decryption queries even after the challenge phase. The setup mirrors IND-CCA1 up to the generation of c^*, but \mathcal{A} retains access to both O_{\text{Encrypt}} and O_{\text{Decrypt}} afterward, with the restriction that it cannot query O_{\text{Decrypt}} on c^* itself. The game proceeds identically otherwise, with the same advantage definition \text{Adv}_{\text{IND-CCA2}}^{\Pi}(\mathcal{A}) = \left| \Pr[b' = b] - \frac{1}{2} \right|. Security requires \text{Adv}_{\text{IND-CCA2}}^{\Pi}(\mathcal{A}) \leq \text{negl}(\lambda) for all \mathcal{A}. This adaptive access in IND-CCA2 captures more powerful malleability attacks, where the adversary can refine its strategy based on post-challenge decryptions of related ciphertexts. The core intuition behind both games is that valid challenge ciphertexts remain computationally indistinguishable from each other—even when the adversary can probe decryptions of arbitrary (but non-challenge) ciphertexts—ensuring that ciphertexts appear random or unrelated to the underlying plaintexts under active scrutiny. IND-CCA1 models non-adaptive chosen-ciphertext attacks (e.g., "lunchtime" scenarios where oracle access is temporarily unavailable post-challenge), while IND-CCA2 addresses fully adaptive threats, making it the standard for modern secure encryption schemes.

Semantic Security

Semantic security, also known as Goldwasser-Micali security, is a notion for schemes that ensures no computationally bounded adversary can extract any partial information about the underlying from the beyond what could be computed without access to the . This concept was introduced as part of probabilistic to capture an information-theoretic-like guarantee in a computational setting, where "partial information" refers to the output of any efficient on the . Formally, consider a public-key encryption scheme (\mathsf{Gen}, \mathsf{Enc}, \mathsf{Dec}). The scheme is semantically secure if for every probabilistic polynomial-time (PPT) adversary \mathcal{A}, there exists a PPT simulator \mathsf{Sim} such that for any PPT algorithm \mathsf{M} that outputs a plaintext m and auxiliary information z (related to m), the distribution of \mathcal{A}'s output after receiving the public key \mathsf{pk}, the ciphertext c = \mathsf{Enc}(\mathsf{pk}, m), and z is computationally indistinguishable from the distribution of \mathsf{Sim}'s output given only \mathsf{pk} and z. Here, both \mathcal{A} and \mathsf{Sim} produce an output corresponding to some efficient function of m and z. Semantic security is equivalent to indistinguishability under (IND-CPA), as proven using arguments in the foundational work on probabilistic encryption. This equivalence holds because both notions enforce polynomial-time privacy against PPT adversaries: IND-CPA provides a syntactic that ciphertexts for equal-length messages are indistinguishable, while offers a semantic that no useful information about the leaks, and the two are interreducible via and techniques. This equivalence was established in the literature and forms the basis for proving in many public-key schemes. While powerful for basic privacy, semantic primarily applies to the model and does not directly extend to chosen-ciphertext attacks without additional mechanisms.

Indistinguishability from Random Bits

Indistinguishability from random bits is a notion for schemes that requires the ciphertext produced by encrypting any to be computationally indistinguishable from a uniformly random of the same . Formally, for a space \mathcal{M} and an algorithm \Enc, the distribution \Enc(m) for any fixed m \in \mathcal{M} must be computationally close to the U_{|\Enc(m)|} over strings of |\Enc(m)|. This ensures that an adversary gains no information about the underlying solely from observing the ciphertext, as it appears as meaningless random . The notion is defined using a probabilistic polynomial-time (PPT) distinguisher \mathcal{D}. The advantage of \mathcal{D} in distinguishing \Enc(m) from a random string r \sim U_{|\Enc(m)|} is given by \Adv_{\mathcal{D}}(\lambda) = \left| \Pr[\mathcal{D}(\Enc(m)) = 1] - \Pr[\mathcal{D}(r) = 1] \right|, where \lambda is the security parameter. An encryption scheme satisfies indistinguishability from random bits if, for all PPT \mathcal{D} and all m \in \mathcal{M}, \Adv_{\mathcal{D}}(\lambda) is negligible in \lambda. This definition captures a strong form of , where no partial about the message can be extracted from the distribution. This security property is stronger than standard indistinguishability under (IND-CPA), which only requires that encryptions of two distinct messages of the same length are indistinguishable from each other. Indistinguishability from random bits implies IND-CPA because the distributions \Enc(m_0) and \Enc(m_1) are both close to the same , making them indistinguishable. However, the converse does not hold: an IND-CPA-secure scheme may produce ciphertexts with shared detectable structure (e.g., a fixed prefix or ), allowing distinction from truly random bits while still satisfying IND-CPA for message pairs. This holds regardless of fixed or variable message lengths, as the bias applies within each length class. The property ensures no information leakage about the message even if the adversary has no specific plaintext guesses, treating the ciphertext as opaque noise. It is particularly useful in hybrid encryption paradigms, where a public-key scheme encapsulates a symmetric key, and the message is encrypted symmetrically; the symmetric ciphertext must appear random to prevent leakage when concatenated with the key encapsulation, preserving overall security. A caveat is that standard IND-CPA security alone is insufficient to achieve indistinguishability from random bits, as demonstrated by schemes secure against related plaintexts under IND-CPA but whose ciphertexts exhibit non-random patterns detectable by statistical tests.

Implications and Applications

Hierarchy of Notions

The security notions for ciphertext indistinguishability under various adversarial models form a hierarchy, where stronger notions imply weaker ones, reflecting progressively more robust protections against information leakage. Indistinguishability under (IND-CCA) provides the strongest guarantee among these, as it ensures security even when the adversary can query a (with restrictions on the challenge ciphertext), and it directly implies indistinguishability under (IND-CPA). IND-CPA, in turn, is equivalent to , meaning that an adversary gains no partial information about the from the beyond its length, even with access to an . Additionally, IND-CPA implies that ciphertexts of single messages are indistinguishable from random bit strings of the same length, but this does not extend to multiple messages, where dependencies between encryptions could reveal structure. However, the implications are not bidirectional. IND-CPA does not suffice for IND-CCA security, as demonstrated by padding oracle attacks, where an IND-CPA-secure scheme like CBC mode with PKCS#7 padding becomes vulnerable to decryption queries that leak plaintext byte-by-byte through padding validation responses. Similarly, indistinguishability from random bits for single messages does not imply IND-CPA security for multiple messages, since an adversary could exploit correlations across multiple ciphertexts even if each individually appears random. In practice, IND-CPA security suffices for basic in scenarios without decryption access, such as simple , while IND-CCA is essential for protocols like SSL/TLS (now TLS), where active adversaries might manipulate ciphertexts. An emerging extension in the is post-compromise security (), which builds on these notions to recover after key compromise through mechanisms, as formalized in analyses of messaging protocols.
Security NotionImplies IND-CCA?Implies IND-CPA?Implies Semantic Security?Implies Randomness (Single Message)?Implies Randomness (Multi-Message)?
IND-CCAYesYesYesYesYes
IND-CPANoYesYesYesNo
NoYesYesYesNo
NoNoNoYesN/A

Constructions and Proofs

One standard construction achieving IND-CPA security in the public-key setting is the , introduced in 1985, which relies on the hardness of the in finite fields. In , the sender encrypts a message m using the receiver's public key (g, h = g^x) by choosing a random r, computing c_1 = g^r, and c_2 = m \cdot h^r, where the ciphertext is (c_1, c_2). This scheme provides IND-CPA security under the Decisional Diffie-Hellman (DDH) assumption. For symmetric-key encryption, the Counter (CTR) achieves IND-CPA security when instantiated with a secure pseudorandom (PRF). In CTR , a random is combined with a counter to generate a keystream via the PRF, which is then XORed with the ; this construction ensures that ciphertexts are indistinguishable from random strings for equal-length messages, assuming the underlying PRF is secure. To achieve IND-CCA security, the (OAEP) scheme, proposed by Bellare and Rogaway in 1994, converts the underlying into a secure public-key encryption method by adding and through a Feistel-like . OAEP provides IND-CCA security in the model, assuming the underlying is one-way. For hybrid encryption, the Fujisaki-Okamoto transform (1999) upgrades IND-CPA-secure public-key and symmetric schemes into an IND-CCA-secure by re-encrypting the symmetric key with added , also in the model. Common proof techniques for IND security include game-hopping, which structures proofs as a sequence of hybrid games where each step makes a minimal, indistinguishable change to the adversary's view, bounding the total distinguishing advantage by the sum of individual hops. Another key technique is the hybrid encryption paradigm using (KEM) and Data Encapsulation Mechanism (DEM), where a secure KEM encapsulates a random symmetric key, which the IND-CPA-secure DEM then uses to encrypt the , composing to achieve overall IND-CCA security under appropriate assumptions. A representative proof of ElGamal's IND-CPA security under the DDH assumption proceeds via a direct reduction. Assume an IND-CPA adversary \mathcal{A}. A DDH distinguisher \mathcal{B} receives an instance (g, g^x, g^r, Z), where Z = g^{xr} or uniform random, and uses \mathcal{A} as a subroutine. \mathcal{B} sets the public key to (g, h = g^x). When \mathcal{A} submits challenge plaintexts m_0, m_1, \mathcal{B} selects b \leftarrow \{0,1\} uniformly at random, computes the challenge ciphertext as c_1 = g^r, c_2 = m_b \cdot Z, and returns (c_1, c_2) to \mathcal{A}. If Z = g^{xr} = h^r, this is a valid encryption of m_b; otherwise, c_2 is uniform and independent of b, simulating the ideal (random) world of the IND-CPA game where \mathcal{A}'s advantage is negligible. Thus, \mathcal{A}'s distinguishing advantage equals \mathcal{B}'s DDH distinguishing advantage. Challenges in these constructions include obtaining tight reductions, where the reduction loss is independent of the number of queries or messages, as loose reductions (e.g., linear in query count) can undermine practical bounds. Additionally, achieving IND-CCA often introduces efficiency trade-offs, such as increased overhead from or multiple encryptions, which can double or triple computational costs compared to IND-CPA schemes. In the 2020s, research has focused on lattice-based constructions for post-quantum IND-CCA security, exemplified by Kyber, a module-lattice-based key encapsulation mechanism standardized by NIST, which achieves IND-CCA security via the Fujisaki-Okamoto transform applied to an IND-CPA-secure base scheme under the Module Learning With Errors (MLWE) assumption.

References

  1. [1]
    [PDF] Probabilistic Encryption & - How To Play Mental Poker Keeping Secret
    Probabilistic Encryption &. How To Play Mental Poker Keeping Secret. All Partial Information. Shaft Goldwasser * and Silvio Micali **. Computer Science ...
  2. [2]
    [PDF] Relations Among Notions of Security for Public-Key Encryption ...
    Specifically, Goldwasser and. Micali introduced, and showed equivalent, the notions of indistinguishability and semantic security;. Yao introduced a notion ...
  3. [3]
    [PDF] Ciphertext indistinguishability - CSE IIT KGP
    Ciphertext indistinguishability is an important security property of many encryption schemes. Intuitively, if a cryptosystem possesses the property of ...
  4. [4]
    [PDF] On Quantum Ciphertext Indistinguishability, Recoverability, and OAEP
    An encryption scheme that achieves ciphertext indistinguishability comes with the guarantee that an adversary cannot learn any information about the message ...
  5. [5]
    Probabilistic encryption - ScienceDirect.com
    11. S. Goldwasser, S. Micali. Probabilistic encryption & how to play mental poker, keeping secret all partial information.
  6. [6]
    [PDF] Lecture Notes on Cryptography - Department of Computer Science
    This is a set of lecture notes on cryptography compiled for 6.87s, a one week long course on cryptography taught at MIT by Shafi Goldwasser and Mihir ...
  7. [7]
    [PDF] Communication Theory of Secrecy Systems - cs.wisc.edu
    “Perfect Secrecy” is defined by requiring of a system that after a cryp- togram is intercepted by the enemy the a posteriori probabilities of this cryp- togram ...
  8. [8]
    Probabilistic encryption & how to play mental poker keeping secret ...
    This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, ...
  9. [9]
    [PDF] Multi-Recipient Encryption Schemes: Security Notions and ...
    The El Gamal scheme in a group of prime order is known to be IND-CPA under the assumption that the decision Diffie-Hellman (DDH) problem is hard. (This is noted ...
  10. [10]
    [PDF] Relations Among Notions of Non-Malleability for Encryption
    In a chosen-plaintext attack (CPA), the oracles O1,O2 return the empty string. In a CCA1 attack, the oracle O1(pk, ·) returns the decryption of its input under ...<|control11|><|separator|>
  11. [11]
    [PDF] attacks on ssl a comprehensive study of beast, crime, time, breach ...
    Aug 15, 2013 · Specifically, the attacker can mount a chosen plaintext attack by injecting plaintext blocks of their choice to be encrypted. This essentially ...<|control11|><|separator|>
  12. [12]
    [PDF] Public-key Cryptosystems Provably Secure against Chosen ...
    These two notions were shown to be equivalent by Goldwasser and Micali [19]. (indistinguishability ⇒ semantic), Micali, Rackoff and Sloan [28] (semantic ⇒ ...Missing: concept | Show results with:concept<|control11|><|separator|>
  13. [13]
    [PDF] Chapter 5 Symmetric Encryption
    Bellare and Rogaway. 3 the latter outputs ⊥ or it ... The technical notion is called indistinguishability under chosen-ciphertext attack, denoted IND-CCA.
  14. [14]
    [PDF] asymmetric (public-key) encryption - UCSD CSE
    Three types of schemes/syntax : Public-key encryption, key encapsulation mechanism, symmetric encryption • For each, two definitions of security: IND-CPA, IND- ...
  15. [15]
    [PDF] A public key cryptosystem and a signature scheme based on ...
    A new signature scheme is proposed together with an implementation of the Diffie - Hell- man key distribution scheme that achieves a public key cryptosystem.
  16. [16]
    [PDF] Authenticated-Encryption with Associated-Data
    Sep 20, 2002 · The IND$-CPA property also allows the direct use of an encryption scheme as a pseudorandom generator or as a PRF. (5) Given the frequency with ...Missing: 1990s | Show results with:1990s
  17. [17]
    Symmetric-Key Cryptography - Computer Security
    AES is not truly indistinguishable from random, but it is believed to be computationally indistinguishable from random. Intuitively, this means that given a ...
  18. [18]
    [PDF] Post-Compromise Security - Cryptology ePrint Archive
    Feb 10, 2016 · A protocol between Alice and Bob provides Post-Compromise Security (PCS) if Alice has a security guarantee about communication with Bob ...
  19. [19]
    [PDF] Lecture 19: 2006.03.21 19.1 Proof of Security for El Gamal
    Mar 21, 2006 · Theorem 19.1 If the Discrete Diffie-Hellman problem is hard (i.e. if the DDH assumption holds), El Gamal is IND-CPA secure. Proof: Assume ...
  20. [20]
    [PDF] Optimal Asymmetric Encryption How to Encrypt with RSA - UCSD CSE
    Nov 19, 1995 · Bellare, J. Kilian and P. Rogaway, “On the security of cipher-block chaining,” Ad- vances in Cryptology – Crypto 94 Proceedings, Lecture ...
  21. [21]
    [PDF] Sequences of Games: A Tool for Taming Complexity in Security Proofs
    Jan 18, 2006 · This paper is brief tutorial on a technique for structuring security proofs as sequences games. 1 Introduction. Security proofs in cryptography ...
  22. [22]
    [PDF] KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid ...
    Aug 8, 2006 · The KEM/DEM hybrid encryption paradigm combines the efficiency and large message space of secret key encryption with the advantages of ...
  23. [23]
    [PDF] On the Impossibility of Tight Cryptographic Reductions?
    Abstract. The existence of tight reductions in cryptographic security proofs is an important question, motivated by the theoretical search for cryptosystems ...
  24. [24]
    [PDF] Chosen-Ciphertext Security from Identity-Based Encryption
    Jun 13, 2006 · Table 1: Efficiency comparison for CCA-secure encryption schemes. ... adaptive CCA security with essentially no overhead. We also thank ...Missing: trade- | Show results with:trade-
  25. [25]
    [PDF] CRYSTALS – Kyber: a CCA-secure module-lattice-based KEM
    In this paper, we propose and implement a portfolio of post-quantum cryptographic primitives (CPA- secure encryption, CCA-secure KEM, CCA-secure public- key ...